60-Objects Tab
60-Objects Tab
o Palo Alto Firewall, Object is a container that groups specific policy filter values.
o Example of Object are such as IP addresses, URLs, applications, or services etc.
o Palo Alto Network Firewall, the Object are used for simplified rule definition.
o Address object might contain specific IP address definitions for web in DMZ zone.
o Palo Alto Firewall is Object Based device where Objects are configuration elements.
Settings Description
Name Enter name describes the addresses you will include as part of this object.
Description Enter a description for the object.
Type Specify an IPv4 or IPv6 address or address range, or an FQDN.
IP Netmask:
Examples:
192.168.80.150/32—Indicates one address.
192.168.80.0/24—all addresses from 192.168.80.0 through 192.168.80.255.
IP Range:
Enter a range of addresses using the following format:
ip_address-ip_address
192.168.80.100-192.168.80.200
where both ends of the range are IPv4 addresses or both are IPv6 addresses.
FQDN:
To specify an address using the FQDN, select FQDN and enter the domain
name. The FQDN is resolved by the system DNS server or DNS Proxy object.
Resolve After selecting the address type and entering an IP address or FQDN,
click Resolve to see the associated FQDN or IP addresses.
Tags Select or enter the tags that you wish to apply to this address object.
Settings Description
Name Enter a name that describes the address group.
Description Enter a description for the object.
Type Select Static or Dynamic.
Addresses For static address group, click Add & select one or more Addresses. Click Add
to add an object or an address group to the address group. The group can
contain address objects.
Tags Select or enter the tags that you wish to apply to this address group.
Click the Add button to add Address objects or address Group, alternatively, click on Browse
button to open a new window from there click on plus sign to add address objects. If want to
add Address Group, then click on Address Group tab to add.
o For TCP or UDP service, configure the timeout values to "Inherit from application"
o For TCP or UDP service also can be set the timeout values by using "Override".
o Click OK to add the service and click commit to save & apply the configuration.
o Now can reference the newly added service when configuring the security policy.
Settings Description
Name Enter the service group name.
Service Click Add to add services to the group. Select from the drop-down or
click Service at the bottom of the drop-down and specify the settings.
o Go to Objects > Tags, and then click the Add button at the bottom of the screen.
Settings Description
Name Enter a schedule name. This name appears in the schedule list when
defining security policies.
Recurrence Select the type of schedule (Daily, Weekly, or Non-Recurring).
Daily Click Add and specify a Start Time and End Time in 24-hour format
(HH:MM).
Weekly Click Add, select a Day of Week, and specify the Start Time and End Time in
24-hour format (HH:MM).
Non-recurring Click Add and specify a Start Date, Start Time, End Date, and End Time.
Let’s create a Schedule Object for Twitter named: Twitter-Schedule, Recurrence: Daily, Start
Time: 2PM and End Time: 11:30PM
go to Policies > Security > Security Policy Rule > Schedule > Actions to apply